The Capacity Region of the $L$ -User Gaussian Inverse Compute-and-Forward Problem

We consider an L-user multiple access channel where transmitter m has access to the linear equation u<sub>m</sub> = ⊕<sub>l=1</sub><sup>L</sup> f<sub>ml</sub>w<sub>l</sub> of independent messages w<sub>l</sub> ∈ F<sub>p</sub><sup>k</sup>l with f<sub>ml</sub> ∈ F<sub>p</sub>, and the destination wishes to recover all L messages. This problem may be motivated as the last hop in a network where relay nodes employ the compute-and-forward strategy and decode linear equations of messages; we seek to do the reverse and extract messages from sums over a multiple access channel. In particular, we exploit the particular form of dependencies between the equations at the different relays to improve the reliable communication rates beyond those achievable by simply forwarding all equations to the destination independently. The presented achievable rate region for the discrete memoryless channel model is shown to be capacity for the additive white Gaussian noise channel.

[1]  Te Sun Han,et al.  The Capacity Region of General Multiple-Access Channel with Certain Correlated Sources , 1979, Inf. Control..

[2]  Deniz Gündüz,et al.  On the capacity region of a multiple access channel with common messages , 2010, 2010 IEEE International Symposium on Information Theory.

[3]  Giuseppe Caire,et al.  Two-unicast two-hop interference network: Finite-field model , 2013, 2013 IEEE Information Theory Workshop (ITW).

[4]  Masoud Salehi,et al.  Multiple access channels with arbitrarily correlated sources , 1980, IEEE Trans. Inf. Theory.

[5]  Michael Gastpar,et al.  Integer-forcing linear receivers , 2010, 2010 IEEE International Symposium on Information Theory.

[6]  Giuseppe Caire,et al.  Structured Lattice Codes for 2 \times 2 \times 2 MIMO Interference Channel , 2013, ArXiv.

[7]  Giuseppe Caire,et al.  Compute-and-Forward Strategies for Cooperative Distributed Antenna Systems , 2012, IEEE Transactions on Information Theory.

[8]  Michael Gastpar,et al.  Compute-and-Forward: Harnessing Interference Through Structured Codes , 2009, IEEE Transactions on Information Theory.

[9]  Natasha Devroye,et al.  Inverse compute-and-forward: Extracting messages from simultaneously transmitted equations , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[10]  Giuseppe Caire,et al.  Structured lattice codes for 2×2×2 MIMO interference channel , 2013, 2013 IEEE International Symposium on Information Theory.

[11]  Angela Michèle Wigger,et al.  Cooperation on the Multiple-Access Channel , 2008 .

[12]  Giuseppe Caire,et al.  Reverse compute and forward: A low-complexity architecture for downlink distributed antenna systems , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[13]  D. Slepian,et al.  A coding theorem for multiple access channels with correlated sources , 1973 .

[14]  Natasha Devroye,et al.  The capacity region of three user Gaussian inverse-compute-and-forward channels , 2013, 2013 IEEE International Symposium on Information Theory.